First published: Tue May 23 2006(Updated: )
A recommended admin password reset mechanism for BEA WebLogic Server 8.1, when followed before October 10, 2005, causes the administrator password to be stored in cleartext in the domain directory, which could allow attackers to gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle WebLogic Server | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2546 is considered a high severity vulnerability due to the potential for attackers to gain administrative privileges.
To mitigate CVE-2006-2546, ensure that the administrator password is not stored in cleartext and follow the recommended password reset mechanisms post-October 10, 2005.
CVE-2006-2546 specifically affects BEA WebLogic Server version 8.1.
The risks of CVE-2006-2546 include unauthorized access to administrative functions and sensitive data exposure.
A workaround for CVE-2006-2546 includes manually changing the stored password to ensure it is securely hashed rather than stored in cleartext.